参考文献
[1]诸葛建伟,韩心慧,周勇林,等.僵尸网络研究[J].软件学报,2008,19(3):702-715.
[2]ZHOU Shijie.A Survey on Fast-Flux Attacks[J].Information Security Journal:A Global Perspective,2015,24(4-6):79-97.
[3]GOEBEL J,HOLZ T.Rishi:Identify Bot Contaminated Hosts by Irc Nickname Evaluation[C]//Proceedings of the 1st Workshop on Hot Topics in Understanding Botnets.New York,USA:ACM Press,2007:8.
[4]BINKLEY J R,SINGH S.An Algorithm for Anomaly-based Botnet Detection[C]//Proceedings of the 2nd Con-ference on Steps to Reducing Unwanted Traffic on the Internet.New York,USA:ACM Press,2006:43-48.
[5]GU Guofei,PORRAS P A,YEGNESWARAN V,et al.Bot Hunter:Detecting Malware Infection Through IDS-driven Dialog Correlation[C]//Proceedings of the 16th USENIX Security Symposium on USENIX Security Symposium.New York,USA:ACM Press,2007:1-16.
[6]KARASARIDIS A,REXROAD B,HOEFLIN D.Wide-scale Botnet Detection and Characterization[C]//Proceedings of the 1st Conference on Hot Topics in Understanding Botnets.New York,USA:ACM Press,2007:1-7.
[7]GU G,ZHANG J,LEE W.Bot Sniffer:Detecting Botnet Command and Control Channels in Network Traffic[C]//Proceedings of the 15th Annual Network and Distributed System Security Symposium.New York,USA:ACM Press,2008:2-19.
[8]COOKE E,JAHANIAN F,MCPHERSON D.The Zombie Roundup:Understanding,Detecting,and Disrupting Botnets[C]//Proceedings of the Steps to Reducing Unwanted Traffic on the Internet Workshop.New York,USA:ACM Press,2005:1-6.
[9]ABU R M,ZARFOSS J,MONROSE F,et al.A Multifaceted Approach to Understanding the Botnet Phenomenon[C]//Proceedings of the 6th ACM SIGCOMM Conference on Internet Measurement.New York,USA:ACM Press,2006:41-52.
[10]FABIAN M,TERZIS M A.My Botnet is Bigger than Yours (Maybe,Better than Yours):Why Size Estimates Remain Challenging[C]//Proceedings of the 1st USENIX Workshop on Hot Topics in Understanding Botnets.New York,USA:ACM Press,2007:1-5.
[11]DAGON D,ZOU C C,LEE W.Modeling Botnet Propaga-tion Using Time Zones[C]//Proceedings of Network & Distributed System Security Symposium.New York,USA:ACM Press,2006:2-13.
[12]GRIZZARD J B,SHARMA V,NUNNERY C,et al.Peer-to-Peer Botnets:Overview and Case Study[C]//Proceedings of the 1st Conference on Hot Topics in Understanding Botnets.New York,USA:ACM Press,2007:1.
[13]WANG Ping,SPARKS S,ZOU C C.An Advanced Hybrid Peer-to-Peer Botnet[J].IEEE Transactions on Dependable and Secure Computing,2010,7(2):113-127.
[14]HOLZ T,GORECKI C,FREILING F,et al.Detection and Mitigation of Fast-flux Service Networks[EB/OL].(2009-03-03).http://www.isoc.org/isoc/conferences/ndss/08/papers/16_measuring_and_detecting.pdf
[15]康乐.基于 DNS 数据流的僵尸网络检测技术研究[D].哈尔滨:哈尔滨工业大学,2011.
[16]KONTE M,FEAMSTER N,JUNG J.Fast Flux Service Networks:Dynamics and Roles in Online Scam Hosting Infrastructure[M].[S.l.]:Georgia Institute of Tech-nology,2008.
[17]PASSERINI E,PALEARI R,MARTIGNONI L,et al.FluxOR:Detecting and Monitoring Fast-flux Service Networks[M]//Flegel U,Markatos E,Robertson W.Detection of Intrusions and Malware,and Vulnerability Assessment.Berlin,Germany:Springer,2008.
[18]HU Xin,KNYSZ M,SHIN K G.Measurement and Analysis of Global IP-usage Patterns of Fast-flux Botnets[C]//Proceedings of INFOCOM’11.Washington D.C.,USA:IEEE Press,2011:2633-2641.
编辑顾逸斐 |